/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_aka.c | 271 size_t len; local 287 len = wpabuf_len(data->id_msgs); 288 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA: AT_CHECKCODE data", addr, len); 290 sha256_vector(1, &addr, &len, hash); 292 sha1_vector(1, &addr, &len, hash); 304 size_t len; local 333 len = wpabuf_len(data->id_msgs); 335 sha256_vector(1, &addr, &len, hash); 337 sha1_vector(1, &addr, &len, hash); 655 size_t len; local 1183 size_t len; local 1256 eap_aka_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 1273 eap_aka_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_server_eke.c | 387 size_t len; local 391 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_EKE, respData, &len); 392 if (pos == NULL || len < 1) { 689 size_t len; local 692 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_EKE, respData, &len); 693 if (pos == NULL || len < 1) 697 end = pos + len; 726 static u8 * eap_eke_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 738 *len = EAP_MSK_LEN; 744 static u8 * eap_eke_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_server_fast.c | 120 static int eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, argument 136 ticket, len); 138 if (len < 4 || WPA_GET_BE16(ticket) != PAC_TYPE_PAC_OPAQUE) { 147 pac_opaque_len > len - 4) { 149 "(len=%lu left=%lu)", 151 (unsigned long) len); 805 pac_info->len = host_to_be16(pos - (u8 *) (pac_info + 1)); 825 "(len=%d) with last Phase 1 Message (len=%d " 926 size_t len; local 1092 size_t len; local 1128 size_t len; local 1229 eap_fast_pac_type(u8 *pac, size_t len, u16 type) argument 1265 u16 type, len, res; local 1548 eap_fast_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 1567 eap_fast_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_server_gpsk.c | 105 size_t len; local 118 len = 1 + 2 + sm->server_id_len + EAP_GPSK_RAND_LEN + 2 + 120 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len, 146 size_t len, miclen; local 153 len = 1 + 2 * EAP_GPSK_RAND_LEN + 2 + sm->server_id_len + 155 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len, 214 size_t len; local 216 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GPSK, respData, &len); 217 if (pos == NULL || len < 1) { 529 size_t len; local 553 eap_gpsk_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 571 eap_gpsk_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_server_gtc.c | 81 size_t len; local 83 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &len); 84 if (pos == NULL || len < 1) {
|
H A D | eap_server_identity.c | 86 size_t len; local 89 respData, &len); 104 size_t len; local 118 respData, &len); 122 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len); 123 buf = os_malloc(len * 4 + 1); 125 printf_encode(buf, len * 4 + 1, pos, len); 132 sm->identity = os_malloc(len ? len [all...] |
H A D | eap_server_ikev2.c | 186 size_t len = wpabuf_len(req); local 190 msg, len, wpabuf_put(req, icv_len)); 244 size_t len; local 247 &len); 281 const u8 *buf, size_t len) 284 if (len > wpabuf_tailroom(data->in_buf)) { 290 wpabuf_put_data(data->in_buf, buf, len); 292 "bytes more", (unsigned long) len, 301 const u8 *buf, size_t len) 318 wpabuf_put_data(data->in_buf, buf, len); 280 eap_ikev2_process_cont(struct eap_ikev2_data *data, const u8 *buf, size_t len) argument 299 eap_ikev2_process_fragment(struct eap_ikev2_data *data, u8 flags, u32 message_length, const u8 *buf, size_t len) argument 350 size_t len; local 478 eap_ikev2_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 496 eap_ikev2_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_server_md5.c | 80 size_t len; local 82 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &len); 83 if (pos == NULL || len < 1) { 87 if (*pos != CHAP_MD5_LEN || 1 + CHAP_MD5_LEN > len) { 90 *pos, (unsigned long) len); 118 pos++; /* Skip response len */
|
H A D | eap_server_mschapv2.c | 245 size_t len; local 248 &len); 249 if (pos == NULL || len < 1) { 288 size_t len, name_len, i; local 296 &len); 297 if (pos == NULL || len < 1) 300 end = pos + len; 304 if (len < sizeof(*resp) + 1 + 49 || 442 size_t len; local 445 &len); 469 size_t len; local 526 eap_mschapv2_getKey(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_server_pax.c | 189 size_t len, mlen; local 192 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PAX, respData, &len); 193 if (pos == NULL || len < sizeof(*resp)) { 198 mlen = sizeof(struct eap_hdr) + 1 + len; 207 (u8 *) (resp + 1), len - sizeof(*resp) - EAP_PAX_ICV_LEN); 261 if (len - sizeof(*resp) < EAP_PAX_ICV_LEN) { 290 size_t len, left, cid_len; local 298 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PAX, respData, &len); 299 if (pos == NULL || len < sizeof(*resp) + EAP_PAX_ICV_LEN) 304 left = len 462 size_t len; local 495 eap_pax_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 516 eap_pax_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_server_peap.c | 372 size_t len[2]; local 393 len[0] = 60; 395 len[1] = 1; 410 addr[0], len[0]); 412 addr[1], len[1]); 413 hmac_sha1_vector(data->cmk, 20, 2, addr, len, mac); 527 size_t len; local 529 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PEAP, respData, &len); 530 if (pos == NULL || len < 1) { 699 "(len 1001 size_t len; local 1175 eap_peap_getKey(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_server_psk.c | 178 size_t len; local 182 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PSK, respData, &len); 183 if (pos == NULL || len < 1) { 203 if ((t == 1 && len < sizeof(struct eap_psk_hdr_2)) || 204 (t == 3 && len < sizeof(struct eap_psk_hdr_4))) { 356 "PSK-4 (len=%lu, expected 21)", 414 size_t len; local 423 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PSK, respData, &len); 424 if (pos == NULL || len < 1) 445 static u8 * eap_psk_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 463 eap_psk_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_server_pwd.c | 429 size_t len; local 490 len = wpabuf_len(data->outbuf) - data->out_frag_pos; 491 if ((len + EAP_PWD_HDR_SIZE) > data->mtu) { 492 len = data->mtu - EAP_PWD_HDR_SIZE; 502 len -= sizeof(u16); 507 (int) len); 514 EAP_PWD_HDR_SIZE + len + 527 wpabuf_put_data(req, buf + data->out_frag_pos, len); 528 data->out_frag_pos += len; 547 size_t len; local 869 size_t len; local 971 eap_pwd_getkey(struct eap_sm *sm, void *priv, size_t *len) argument 990 eap_pwd_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_server_sake.c | 240 size_t len; local 244 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_SAKE, respData, &len); 245 if (pos == NULL || len < sizeof(struct eap_sake_hdr)) { 415 size_t len; local 418 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_SAKE, respData, &len); 419 if (pos == NULL || len < sizeof(struct eap_sake_hdr)) 423 end = pos + len; 455 static u8 * eap_sake_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 467 *len = EAP_MSK_LEN; 473 static u8 * eap_sake_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_server_sim.c | 350 size_t len; local 352 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_SIM, respData, &len); 353 if (pos == NULL || len < 3) { 716 size_t len; local 719 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_SIM, respData, &len); 720 if (pos == NULL || len < 3) 723 end = pos + len; 782 static u8 * eap_sim_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 794 *len = EAP_SIM_KEYING_DATA_LEN; 799 static u8 * eap_sim_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_server_tls.c | 197 size_t len; local 202 &len); 206 &len); 209 respData, &len); 210 if (pos == NULL || len < 1) { 251 static u8 * eap_tls_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 263 *len = EAP_TLS_KEY_LEN; 274 static u8 * eap_tls_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument 295 *len = EAP_EMSK_LEN;
|
H A D | eap_server_tls_common.c | 101 char *label, size_t len) 106 out = os_malloc(len); 110 if (tls_connection_prf(sm->ssl_ctx, data->conn, label, 0, out, len) == 130 keys.server_random_len, out, len)) 217 const u8 *buf, size_t len) 220 if (len > wpabuf_tailroom(data->tls_in)) { 225 wpabuf_put_data(data->tls_in, buf, len); 227 "bytes more", (unsigned long) len, 236 const u8 *buf, size_t len) 256 if (len > message_lengt 100 eap_server_tls_derive_key(struct eap_sm *sm, struct eap_ssl_data *data, char *label, size_t len) argument 216 eap_server_tls_process_cont(struct eap_ssl_data *data, const u8 *buf, size_t len) argument 234 eap_server_tls_process_fragment(struct eap_ssl_data *data, u8 flags, u32 message_length, const u8 *buf, size_t len) argument [all...] |
H A D | eap_server_tnc.c | 328 size_t len; local 331 &len); 337 if (len == 0 && data->state != WAIT_FRAG_ACK) { 342 if (len == 0) 398 const u8 *buf, size_t len) 401 if (len > wpabuf_tailroom(data->in_buf)) { 407 wpabuf_put_data(data->in_buf, buf, len); 409 "bytes more", (unsigned long) len, 418 const u8 *buf, size_t len) 435 wpabuf_put_data(data->in_buf, buf, len); 397 eap_tnc_process_cont(struct eap_tnc_data *data, const u8 *buf, size_t len) argument 416 eap_tnc_process_fragment(struct eap_tnc_data *data, u8 flags, u32 message_length, const u8 *buf, size_t len) argument 451 size_t len; local [all...] |
H A D | eap_server_ttls.c | 78 int mandatory, size_t len) 96 ((u32) (hdrlen + len))); 172 "(len=%d, left=%d) - dropped", 303 struct eap_ttls_data *data, size_t len) 306 len); 486 size_t len; local 488 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_TTLS, respData, &len); 489 if (pos == NULL || len < 1) { 537 "(challenge len %lu password len 77 eap_ttls_avp_hdr(u8 *avphdr, u32 avp_code, u32 vendor_id, int mandatory, size_t len) argument 302 eap_ttls_implicit_challenge(struct eap_sm *sm, struct eap_ttls_data *data, size_t len) argument 907 size_t len; local 1154 eap_ttls_getKey(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_server_vendor_test.c | 95 size_t len; local 97 pos = eap_hdr_validate(EAP_VENDOR_ID, EAP_VENDOR_TYPE, respData, &len); 98 if (pos == NULL || len < 1) { 112 size_t len; local 114 pos = eap_hdr_validate(EAP_VENDOR_ID, EAP_VENDOR_TYPE, respData, &len); 115 if (pos == NULL || len < 1) 140 static u8 * eap_vendor_test_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 155 *len = key_len;
|
H A D | eap_server_wsc.c | 277 size_t len; local 280 respData, &len); 281 if (pos == NULL || len < 2) { 291 const u8 *buf, size_t len, u8 op_code) 302 if (len > wpabuf_tailroom(data->in_buf)) { 308 wpabuf_put_data(data->in_buf, buf, len); 310 "bytes more", (unsigned long) len, 319 const u8 *buf, size_t len) 337 wpabuf_put_data(data->in_buf, buf, len); 340 (unsigned long) len, 290 eap_wsc_process_cont(struct eap_wsc_data *data, const u8 *buf, size_t len, u8 op_code) argument 317 eap_wsc_process_fragment(struct eap_wsc_data *data, u8 flags, u8 op_code, u16 message_length, const u8 *buf, size_t len) argument 353 size_t len; local [all...] |
H A D | eap_sim_db.c | 809 size_t len) 813 if (send(data->sock, msg, len, 0) < 0) { 827 if (send(data->sock, msg, len, 0) < 0) { 875 int len, ret; local 926 len = os_snprintf(msg, sizeof(msg), "SIM-REQ-AUTH "); 927 if (len < 0 || len + imsi_len >= sizeof(msg)) 929 os_memcpy(msg + len, imsi, imsi_len); 930 len += imsi_len; 931 ret = os_snprintf(msg + len, sizeo 808 eap_sim_db_send(struct eap_sim_db_data *data, const char *msg, size_t len) argument 1340 int len; local 1450 int len, ret; local [all...] |
H A D | ikev2.c | 45 size_t len[2]; local 91 len[0] = pad_len; 93 len[1] = wpabuf_len(shared); 95 2, addr, len, skeyseed) < 0) { 801 wpa_printf(MSG_MSGDUMP, "IKEV2: Received message (len %lu)",
|
H A D | tncs.c | 514 const u8 *msg, size_t len) 519 wpa_hexdump_ascii(MSG_MSGDUMP, "TNC: Message to IMV(s)", msg, len); 529 (TNC_BufferReference) msg, len, 598 size_t len = 0; local 601 len += tncs->imv_data[i].imv_send_len; 603 len += os_strlen(tncs->tncs_message); 604 return len; 625 size_t len = os_strlen(tncs->tncs_message); local 626 os_memcpy(pos, tncs->tncs_message, len); 627 pos += len; 513 tncs_send_to_imvs(struct tncs_data *tncs, unsigned int type, const u8 *msg, size_t len) argument 780 tncs_process_if_tnccs(struct tncs_data *tncs, const u8 *msg, size_t len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_auth/ |
H A D | eapol_auth_sm.c | 1015 static const char * eapol_sm_get_eap_req_id_text(void *ctx, size_t *len) argument 1018 *len = sm->eapol->conf.eap_req_id_text_len;
|